Identify the five security sets available to control row-level security. (Choose five.)
Primary Permissions list grants .
You created a Person but did not create a Job record or POI type record for the Person. You are unable to access the data because
You decided to use department security tree to control data access. You set up department trees and assigned access to the departments on the Security byDepartment Tree Permission list page. The permission list is linked to the operator by .
A security administrator associates various permission lists with a user ID when setting up user profiles in the system.These permission lists are and . (Choose two.)
In which two scenarios would you use Role-based data permission security method as compared to Tree based? (Choose two.)